Criminals that profit from account takeover (ATO) attacks have been running rampant with no concern for the consequences. But we now have the power to cause them to pause and think twice regarding taking over accounts. We will share details of the account takeover timeline, when criminals are the most effective and what you can do to protect yourself using various technologies. We will also share how this type of data can be used against criminals - to find both cyber and physical threat actors.
Learn best practices to protect yourself from the threat of account takeover.
Understand limitations of common security practices and how to overcome the weaknesses.
Discuss overall security hygiene and how to incorporate this into our daily routine.